U.S. govt reveals top security flaws exploited by Chinese hackers since 2020

Top security agencies in the US have published the top security vulnerabilities exploited by the People’s Republic of China (PRC) hackers since 2020. NSA, CISA and FBI confirm once again that these Chinese-sponsored hackers are targeting U.S. and allied networks and technology companies in order to gain access and steal sensitive data.

Major flaws include: Apache Log4j (CVE-2021-44228) a remote code execution flaw; Pulse Connect Secure (CVE-2019-11510), an arbitrary file read flaw; GitLab CE/EE (CVE-2021-22205), a remote code execution bug; Atlassian (CVE-2022-26134), a remote code execution bug; Microsoft Exchange (CVE-2021-26855), a remote code execution bug; F5 Big-IP (CVE-2020-5902), a remote code execution flaw; VMware vCenter Server (CVE-2021-22005), an arbitrary file upload bug; Citrix ADC (CVE-2019-19781), a path traversal flaw; Cisco Hyperflex (CVE-2021-1407), a command line execution flaw; and Buffalo WSR (CVE-2021-20090), a relative path traversal flaw.

Others include Atlassian Confluence Server and Data Center (CVE-2021-26084), a remote code execution flaw; Hikvision Webserver (CVE-2021-36260), a command injection flaw; SitecoreXP (CVE-2021-42237), a remote code execution flaw; F5 Big-IP (CVE-2022-1388), a remote code execution flaw; Apache (CVE-2022-24112), an authentication bypass flaw; ZOHO (CVE-2021-40539), a remote code execution flaw; Microsoft (CVE-2021-26857, CVE-2021-26858, and CVE-2021-27065) all remote code execution flaws; and Apache HTTP Server (CVE-2021-41773), a path traversal flaw.

The sources for this piece include an article in BleepingComputer.

IT World Canada Staff
IT World Canada Staff
The online resource for Canadian Information Technology professionals.

Would you recommend this article?


Thanks for taking the time to let us know what you think of this article!
We'd love to hear your opinion about this or any other story you read in our publication.

Jim Love, Chief Content Officer, IT World Canada

Featured Download

ITW in your inbox

Our experienced team of journalists and bloggers bring you engaging in-depth interviews, videos and content targeted to IT professionals and line-of-business executives.

More Best of The Web